General
-
Target
6efce5a7a230a95aadba617a2bdf4e0b0a27f17a4273c6144033229230a8ca69N
-
Size
8.8MB
-
Sample
241004-pqa9vaybne
-
MD5
d2d03e5ab61f23ed8e1f57f691a0c160
-
SHA1
ef3190a509b83a9ba864e39af7934925accb920d
-
SHA256
6efce5a7a230a95aadba617a2bdf4e0b0a27f17a4273c6144033229230a8ca69
-
SHA512
05c503900d808e8cf70904474f9550ef4b02b866867990b898d9f17163a2335ac211907d6c5795e0151541404dd4eecd4f031c69d396ddf7d30fe8a446b754f1
-
SSDEEP
196608:Lxg8VEfNpwfI9jUC2gYBYv3vbW4SEf+iITx1U6nn:28VEfQIH2gYBgDWZjTnzn
Behavioral task
behavioral1
Sample
6efce5a7a230a95aadba617a2bdf4e0b0a27f17a4273c6144033229230a8ca69N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
6efce5a7a230a95aadba617a2bdf4e0b0a27f17a4273c6144033229230a8ca69N
-
Size
8.8MB
-
MD5
d2d03e5ab61f23ed8e1f57f691a0c160
-
SHA1
ef3190a509b83a9ba864e39af7934925accb920d
-
SHA256
6efce5a7a230a95aadba617a2bdf4e0b0a27f17a4273c6144033229230a8ca69
-
SHA512
05c503900d808e8cf70904474f9550ef4b02b866867990b898d9f17163a2335ac211907d6c5795e0151541404dd4eecd4f031c69d396ddf7d30fe8a446b754f1
-
SSDEEP
196608:Lxg8VEfNpwfI9jUC2gYBYv3vbW4SEf+iITx1U6nn:28VEfQIH2gYBgDWZjTnzn
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-